2016
DOI: 10.5120/ijca2016910156
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion

Abstract: Security (i.e. Confidentiality, Integrity, Authentication, NonRepudiation, and Availability) in the field of data communication have remained a subject matter of discussion over the years. The internet as well as computer technology have made significant strive in data communication existence. Transferring data securely and safely amidst vulnerabilities of computer networks remain a source of worry to many in the field of data communication. Without security there is no need for data communication. The main ob… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…The process of encryption converts the secret file to be sent to binary data, whereas the recipient undergoes the process of decryption to reveal the content of the encrypted file. In [7], the process of encryption was applied before compression. This study however, applies the process of compression before encryption.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…The process of encryption converts the secret file to be sent to binary data, whereas the recipient undergoes the process of decryption to reveal the content of the encrypted file. In [7], the process of encryption was applied before compression. This study however, applies the process of compression before encryption.…”
Section: Methodsmentioning
confidence: 99%
“…Steganography on the other hand, hides the message so there is no knowledge of the existence of the message as stated by [13]. As such, steganography works towards masking the existence of a secret file while cryptography concerns itself with masking the content of a secret file [7].…”
Section: Concepts Of Steganography and Cryptographymentioning
confidence: 99%
See 2 more Smart Citations
“…These threats, therefore, make smartphones easy prone to attacks by crackers and malware than our normal desktop computers which is protected. [5] Opined that data communications is needless if there is no security of the data that is being transmitted. Steganography hides the existence of a message whiles cryptography masks the content of a message.…”
Section: Introductionmentioning
confidence: 99%